CN108134673A - A kind of method and device for generating whitepack library file - Google Patents

A kind of method and device for generating whitepack library file Download PDF

Info

Publication number
CN108134673A
CN108134673A CN201711484177.3A CN201711484177A CN108134673A CN 108134673 A CN108134673 A CN 108134673A CN 201711484177 A CN201711484177 A CN 201711484177A CN 108134673 A CN108134673 A CN 108134673A
Authority
CN
China
Prior art keywords
look
library file
whitepack
generation
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711484177.3A
Other languages
Chinese (zh)
Other versions
CN108134673B (en
Inventor
阚志刚
陈彪
王全洲
卢佐华
方宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Bang Bang Safety Technology Co Ltd
Original Assignee
Beijing Bang Bang Safety Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Bang Bang Safety Technology Co Ltd filed Critical Beijing Bang Bang Safety Technology Co Ltd
Priority to CN201711484177.3A priority Critical patent/CN108134673B/en
Publication of CN108134673A publication Critical patent/CN108134673A/en
Application granted granted Critical
Publication of CN108134673B publication Critical patent/CN108134673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • H04L9/16Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms the keys or algorithms being changed during operation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

This application involves terminal security protection technology field more particularly to a kind of method and device for generating whitepack library file, to solve the problems, such as that key in the prior art is unsafe.According to the first determining parameter combination, determine and the matched first generation code block of first parameter combination;The first generation code block is run, it is random to generate look-up table source file;The look-up table source file is compiled, obtains whitepack library file.So as to so that key updating is more convenient, moreover, in more new key, does not need to update whitepack library file, therefore, can simplify dynamic whitepack encryption flow, and promote the safety of key.And then promote safety of the user when ciphertext being decrypted and to being encrypted in plain text.

Description

A kind of method and device for generating whitepack library file
Technical field
This application involves terminal security protection technology field more particularly to a kind of methods and dress for generating whitepack library file It puts.
Background technology
With the development of terminal technology, the application program installed in terminal is more and more.User is using these using journey Some data or user for being not intended to be stolen by attacker can be generated during sequence and are not intended to the execution of application program in itself Logic is inversely cracked by attacker.In order to protect the safety of the data generated in application program and its operational process, it is often necessary to These data are encrypted.
Traditional encryption technology is black box encryption technology, and black box encryption technology generally refers to, in black box (black-box) ring Under border, clear data is encrypted using Encryption Algorithm, obtains ciphertext data and the technology of key.Wherein, black box environment is Refer to, safe and reliable, the sightless running environment for attacker, in the present context, attacker can only obtain Encryption Algorithm Input or output, and key can not be obtained.
In recent years, intelligent terminal is largely popularized, since the running environment of intelligent terminal is that opposing open namely intelligence are whole The running environment at end is visible for attacker and (is commonly called as whitepack (white-box) environment), therefore black box encryption technology is not It is applicable in again, whitepack cryptographic technique is correspondingly suggested.Whitepack cryptographic technique refers to, the close of attack can be resisted under whitepack environment Code technology.Its core concept is that cryptographic algorithm is obscured so that attacker can not learn specific algorithm flow, and then Achieve the purpose that protect key information, prevent attacker from extracting key in whitepack environment, so as to ensure protected data Safety.
Existing whitepack encryption technology typically first selectes a key, and then the mapping in plain text to ciphertext is put Disorderly coding represents the result of coding with the mode of look-up table (also referred to as whitepack library file) so that attacker can not be from look-up table Middle analysis obtains key.Such as the whitepack aes algorithm that Chow et al. is designed.But existing whitepack aes algorithm has been cracked, So that the data under whitepack environment still have security threat.
Invention content
The embodiment of the present application provides a kind of method and device for generating whitepack library file, to solve to exist in the prior art The unsafe problem of key.
In order to solve the above-mentioned technical problem, the embodiment of the present application uses following technical proposals:
A kind of method for generating whitepack library file, including:
According to the first determining parameter combination, determine and the matched first generation code block of first parameter combination;
The first generation code block is run, it is random to generate look-up table source file;
The look-up table source file is compiled, obtains whitepack library file.
A kind of generating means of whitepack library file, including:
Determining module, for according to the first determining parameter combination, determining and the matched code of the first parameter combination Block;
Generation module, it is random to generate look-up table source file for running the first generation code block;
Collector for being compiled to the look-up table source file, obtains whitepack library file.
Above-mentioned at least one technical solution that the embodiment of the present application uses can reach following advantageous effect:
Through the above technical solutions, so that key updating is more convenient, moreover, in more new key, it is white update is not needed to Therefore box library file, can simplify dynamic whitepack encryption flow, and promote the safety of key.And then user is promoted to close Text is decrypted and safety during to being encrypted in plain text.
Description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen Illustrative embodiments and their description please do not form the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 (a) is one of flow diagram of generation method of whitepack library file that the application provides;
Fig. 1 (b) is the two of the flow diagram of the generation method of whitepack library file that the application provides;
Fig. 2 is the flow diagram of the method for down loading of whitepack library file that the application provides;
Fig. 3 (a) is one of flow diagram of method for down loading of whitepack library file that the application provides;
Fig. 3 (b) is the two of the flow diagram of the method for down loading of whitepack library file that the application provides
Fig. 4 (a) is the structure diagram of the generating means of whitepack library file that the application provides;
Fig. 4 (b) is the structure diagram of the download apparatus of whitepack library file that the application provides.
Specific embodiment
Purpose, technical scheme and advantage to make the application are clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Go out all other embodiments obtained under the premise of creative work, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical solution that each embodiment of the application provides is described in detail.
In this application, a kind of dynamic white-box techniques scheme is mainly described.So-called dynamic whitepack refers to whitepack library file It does not need to update again after generation, primary key carries out key conversion, it is close to obtain whitepack by specific whitepack key generation facility Key;After the whitepack library file that whitepack key matches with corresponding document transmission, it is possible to plaintext be carried out by way of tabling look-up Ciphertext is decrypted in encryption.In the encryption and decryption scheme of the dynamic whitepack, whitepack key is safe, and attacker cannot Any information about primary key is obtained by analyzing whitepack key, thus, it is possible to strengthen the difficulty that cracks of primary key, is protected Hinder the safety of encryption and decryption operation.
Separately below by several scheme branches in dynamic white-box techniques, it is situated between comprehensively to entire dynamic white-box techniques It continues.
Wherein, entire dynamic white-box techniques include:The generation scheme of dynamic whitepack library file;Under dynamic whitepack library file Load scheme;The generation scheme of dynamic whitepack key;The download scenarios of dynamic whitepack key;And using whitepack library file and Whitepack key carries out the scheme of encryption and decryption.
With reference to shown in Fig. 1 (a), for the flow diagram of the generation method of whitepack library file that the application provides, need Bright, the executive agent of the generation scheme of the whitepack library file can be server, and server here can specially be used In the child servers for carrying out the whitepack system server of whitepack file process or being integrated in developer's server.It should Generation method mainly includes the following steps that:
Step 11:According to the first determining parameter combination, determine and the matched first generation code block of first parameter combination.
Optionally, in this application, step 11 determines and first parameter group according to the first determining parameter combination When closing matched first generation code block, with reference to shown in Fig. 1 (b), specific perform is:
Step 111:The first parameter combination is determined from the library file generation request received.
Specifically, in this application, library file generation request can be generated and be submitted by client.Wherein, library file is given birth to The first parameter combination is carried into request, is included at least in first parameter combination:Algorithm mark is applicable in platform identification and mesh These three types of mark function.
The algorithm mark refers to the combination of a kind of algorithm mark or many algorithms mark in Encryption Algorithm.At present The Encryption Algorithm of support includes:Advanced Encryption Standard (Advanced Encryption Standard, AES) algorithm, data add Close algorithm (Data Encryption Standard, DES), triple data encryption algorithm (Triple Data Encryption Standard, TDES) and block cipher SM4.
The applicable platform identification refers to the terminal operating system that the dynamic white-box techniques are applicable in.The operation of support System includes at least:Android operation system or iOS operating systems, are also not limited to this in fact, can also support to be compatible with Android operation system and iOS operating systems.Wherein, Android operation system can support to generate static whitepack library file and Dynamic whitepack library file;IOS operating systems can be supported to generate static whitepack library file.
The objective function, it is for encrypting, decrypting or encryption and decryption to refer to whitepack library file to be generated.Goal Function can carry out single choice or multiselect when client opening is to user for user.
In fact, in this application, the first parameter combination can also wrap other than the parameter comprising above-mentioned three types Contain:Apparatus bound function;Can be specifically:It adds apparatus bound function or does not add apparatus bound function.It specifically can be The mark of client is added in first parameter combination.So as to so that the processing side of the dynamic white-box techniques can be directed to specific User carries out whitepack cipher key service.
Step 112:The corresponding first generation code block of code library to be matched according to first parameter combination selection.
The first parameter combination of its carrying is parsed from the library file generation request that client receives, then, according to First parameter combination chooses the code library to match from encryption library corresponding with Encryption Algorithm, wherein, the number of encryption library Match with Encryption Algorithm, can be 4 or 8 etc., the application is simultaneously not construed as limiting.It determines to correspond to according to the code library of selection First generation code block.Wherein, multiple first generation code blocks are included in each code library.
Step 12:The first generation code block is run, it is random to generate look-up table source file.
Specifically, in this application, look-up table source file can be the code collection for including look-up table.Wherein, the lookup Table source file can be generated according to default create-rule dynamic random, so as to ensure the library file initiated every time generation request institute The look-up table source file of generation is all different, so that it is all not to carry out the whitepack library file that key request is generated every time With, improve the safety of encryption and decryption.
Optionally, in this application, step 12, which specifically performs, is:Run the first generation code block, dynamic random generate to The fixed code of a few look-up table and corresponding each look-up table, wherein, the fixed code record has to described at least one Look-up table performs search rule during table lookup operation.The search rule is for indicate how look-up table and lookup mode.Its Real, look-up table is existing in a manner of mapping relations, the process tabled look-up be exactly input plaintext-output ciphertext or, input The process of ciphertext-output plaintext.
Step 13:The look-up table source file is compiled, obtains whitepack library file.
In this application, step 13 specifically includes:By at least one look-up table and the fixation of corresponding each look-up table Code is combined;The fixed code of at least one look-up table after combination and corresponding each look-up table is compiled It translates, obtains whitepack library file.
Look-up table in the whitepack library file is used to the plaintext subsequently inputted be encrypted or for subsequently inputting Ciphertext be decrypted.
Through the above technical solutions, using dynamic white-box techniques, according to what is carried in the library file generation request received First parameter combination determines corresponding first generation code block, and after first generation code block is run, and dynamic random generation is corresponding to search Table and corresponding fixed code after being compiled look-up table and corresponding fixed code, are obtained in dynamic white-box techniques Whitepack library file, in more new key, do not need to update whitepack library file, therefore, dynamic whitepack encryption flow can be simplified, And promote the safety of key.
In addition, in this application, it is contemplated that be compiled to look-up table source file, obtaining whitepack library file is, unlimited It is fixed that only look-up table and corresponding fixed code are compiled, different action types can also be directed to, addition is corresponding Code is encapsulated, for being docked with corresponding operating system.For example, for Android operation system, JNI generations can be added Code is used as interface encapsulation code, is compiled after the JNI code and look-up table and fixed code common combination, obtains whitepack library File, in order to which the whitepack library file is suitable for corresponding Android operation system.It for another example, can be with for iOS operating systems Other are added similar to code (code can be docked with the interface of iOS operating systems) as interface encapsulation code, it should It is compiled after interface encapsulation code and look-up table and fixed code common combination, obtains whitepack library file, in order to which this is white Box library file is suitable for corresponding iOS operating systems.This design can be in order to dock with whitepack canonical algorithm, and integrated level is high.
With reference to shown in Fig. 2, for the flow diagram of the method for down loading of whitepack library file that the application provides, the method for down loading It is mainly introduced with client and whitepack key server this system perspective, which mainly includes the following steps that:
Step 21:Client submits library file generation request to server.
Specifically, client receives the selection instruction of the selection operation triggering of user, determines the first parameter that user chooses Combination;Later, first parameter combination is added in library file generation request, and clothes is submitted into library file generation request Business device, submission here can be understood as sending.The first parameter combination is carried in library file generation request.First ginseng Array includes at least in closing:Algorithm mark is applicable in platform identification and objective function these three types.
By the agency of in the generation scheme of above-mentioned whitepack library file, details are not described herein again.
In fact, in this application, the first parameter combination can also wrap other than the parameter comprising above-mentioned three types Contain:Apparatus bound function;Can be specifically:It adds apparatus bound function or does not add apparatus bound function.It specifically can be The mark of client is added in first parameter combination.So as to so that the processing side of the dynamic white-box techniques can be directed to specific User carries out whitepack cipher key service.
Step 22:The server determines to ask matched first generation code block with library file generation;Run described One code block, it is random to generate look-up table source file;The look-up table source file is compiled, the whitepack library file of generation is sent out Give client.
Specifically, server generates request according to the library file received, parses the first parameter combination of its carrying, so Afterwards, according to first parameter combination, the code library to match is chosen from encryption library corresponding with Encryption Algorithm, according to selection Code library determines corresponding first generation code block.Look-up table source file can be the code collection for including look-up table.Wherein, the lookup Table source file can be generated according to default create-rule dynamic random, so as to ensure the library file initiated every time generation request institute The look-up table source file of generation is all different, so that it is all not to carry out the whitepack library file that key request is generated every time With, improve the safety of encryption and decryption.
The first generation code block is run, dynamic random generates the fixation generation of at least one look-up table and corresponding each look-up table Code, wherein, the fixed code record has search rule when table lookup operation is performed at least one look-up table.It is described to look into Rule is looked for for indicate how look-up table and lookup mode.In fact, look-up table is existing in a manner of mapping relations, is tabled look-up Process be exactly, input plaintext-output ciphertext or, input ciphertext-output plaintext process.
At least one look-up table is combined with the fixed code of corresponding each look-up table;Described in after combination The fixed code of at least one look-up table and corresponding each look-up table is compiled, and obtains whitepack library file.The whitepack library text Look-up table in part is used to the plaintext subsequently inputted be encrypted or for the ciphertext subsequently inputted to be decrypted.
Finally, obtained whitepack library file is sent to client.
Step 23:The client receives the whitepack library file of the server feedback, in order to subsequently according to described white Box library file and the key file received carry out encryption and decryption operation.
Client receives the whitepack library file of server feedback, and stores, in order to which client is according to the whitepack library file Plaintext input by user or ciphertext are handled.So far, the down operation of whitepack library file is completed.
In fact, in this application, there may be while multiple client initiates the situation that the generation of whitepack library file is asked, this When, the mark according to each client is needed, the generation operation of different whitepack library files is carried out respectively, later, sends respectively Give the corresponding client of client identification.
With reference to shown in Fig. 3 (a), for the flow diagram of the method for down loading of whitepack library file that the application provides, the download Method is mainly introduced with client-side, which mainly includes the following steps that:
Step 31:Library file generation request is submitted to server.
Step 32:The whitepack library file that server generates request feedback according to the library file is received, in order to follow-up root Encryption and decryption operation is carried out according to the whitepack library file and the key file received.
Optionally, with reference to shown in Fig. 3 (b), before library file generation request is submitted to server, the method is also wrapped It includes:
Step 33:Determine the parameter combination that user chooses, the parameter combination includes at least:Encryption algorithm identification is applicable in Platform identification, objective function.
Step 34:Generation carries the library file generation request of the parameter combination.
Optionally, step 32 specifically includes:The server is received according to the ginseng carried in library file generation request Array closes the whitepack library file of feedback.
Optionally, in this application, the whitepack library file determines in the following manner:According to determining parameter combination, It determines and the matched code block of the parameter combination;The code block is run, it is random to generate look-up table source file;To the lookup Table source file is compiled, and obtains whitepack library file.
With reference to shown in Fig. 4 (a), for the structure diagram of the generating means of whitepack library file that the application provides, the device Mainly include following functions module:
Determining module 41a, for according to the first determining parameter combination, determining and the first parameter combination matched generation Code block.
Generation module 42a, it is random to generate look-up table source file for running the first generation code block.
Collector 43a for being compiled to the look-up table source file, obtains whitepack library file.
The determining module, specifically for determining the first parameter combination from the library file generation request received;According to The corresponding first generation code block of code library that the parameter combination selection matches.
Optionally, the generation module 42a, specifically for running the first generation code block, dynamic random generation at least one The fixed code of a look-up table and corresponding each look-up table, wherein, the fixed code record has at least one lookup Table performs search rule during table lookup operation.
Optionally, the collector 43a, specifically for by least one look-up table and corresponding each look-up table Fixed code is combined;The fixed code of at least one look-up table after combination and corresponding each look-up table is carried out Compiling, obtains whitepack library file.
With reference to shown in Fig. 4 (b), for the structure diagram of the download apparatus of whitepack library file that the application provides, the device Mainly include following functions module:
Sending module 41b, for submitting library file generation request to server;
Receiving module 42b generates the whitepack library file of request feedback for receiving the server according to the library file, In order to subsequently carry out encryption and decryption operation according to the whitepack library file and the key file received.
Optionally, referring now still to Fig. 4 (b) Suo Shi, described device further includes:
Determining module 43b, for before library file generation request is submitted to server, determining the parameter group that user chooses It closes;Generation carries the library file generation request of the parameter combination;Wherein, the parameter combination includes at least:Encryption Algorithm Mark is applicable in platform identification, objective function.
Optionally, the receiving module 42b, specifically for receiving the server according in library file generation request The whitepack library file of the parameter combination feedback of carrying.
In fact, in this application, the download apparatus of whitepack library file can be considered as the system for downloading whitepack library file, packet It includes:Client and server;
The client receives the whitepack library of the server feedback for submitting library file generation request to server File, in order to subsequently carry out encryption and decryption operation according to the whitepack library file and the key file received;
The server asks matched code block for determining to generate with the library file;The code block is run, with Machine generates look-up table source file;The look-up table source file is compiled, the whitepack library file of generation is sent to client.
The embodiment of the present invention also provides a kind of mobile terminal, and including processor, memory, storage is on a memory and can be The computer program run on the processor, the computer program are realized when being executed by processor under above-mentioned whitepack library file Each process of the embodiment of support method, and identical technique effect can be reached, it is repeated to avoid, which is not described herein again.
The embodiment of the present invention also provides a kind of server apparatus, and including processor, memory, storage is on a memory and can The computer program run on the processor, the computer program realize above-mentioned whitepack library file when being executed by processor Each process of the embodiment of generation method, and identical technique effect can be reached, it is repeated to avoid, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realized when being executed by processor above-mentioned whitepack library file method for down loading and/or, whitepack library text Each process of the generation method embodiment of part, and identical technique effect can be reached, it is repeated to avoid, which is not described herein again. Wherein, the computer readable storage medium, such as read-only memory (Read-Only Memory, abbreviation ROM), arbitrary access Memory (RandomAccess Memory, abbreviation RAM), magnetic disc or CD etc..
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware can be used in the present invention Apply the form of example.Moreover, the computer for wherein including computer usable program code in one or more can be used in the present invention The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices is generated for real The device of function specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps are performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, CD-ROM read-only memory (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, available for storing the information that can be accessed by a computing device.It defines, calculates according to herein Machine readable medium does not include temporary computer readable media (transitorymedia), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of elements are not only including those elements, but also wrap Include other elements that are not explicitly listed or further include for this process, method, commodity or equipment it is intrinsic will Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described Also there are other identical elements in the process of element, method, commodity or equipment.
The foregoing is merely embodiments herein, are not limited to the application.For those skilled in the art For, the application can have various modifications and variations.All any modifications made within spirit herein and principle are equal Replace, improve etc., it should be included within the scope of claims hereof.

Claims (10)

  1. A kind of 1. method for generating whitepack library file, which is characterized in that including:
    According to the first determining parameter combination, determine and the matched first generation code block of first parameter combination;
    The first generation code block is run, it is random to generate look-up table source file;
    The look-up table source file is compiled, obtains whitepack library file.
  2. 2. the method as described in claim 1, which is characterized in that according to the first determining parameter combination, determine and described first The matched first generation code block of parameter combination, specifically includes:
    The first parameter combination is determined from the library file generation request received;
    The corresponding first generation code block of code library to be matched according to first parameter combination selection.
  3. 3. the method as described in claim 1, which is characterized in that the first generation code block is run, it is random to generate look-up table source document Part specifically includes:
    The first generation code block is run, dynamic random generates the fixed code of at least one look-up table and corresponding each look-up table, Wherein, the fixed code record has search rule when table lookup operation is performed at least one look-up table.
  4. 4. method as claimed in claim 3, which is characterized in that be compiled to the look-up table source file, obtain whitepack library File specifically includes:
    At least one look-up table is combined with the fixed code of corresponding each look-up table;
    The fixed code of at least one look-up table after combination and corresponding each look-up table is compiled, obtains whitepack Library file.
  5. 5. a kind of generating means of whitepack library file, which is characterized in that including:
    Determining module, for according to the first determining parameter combination, determining and the matched code block of the first parameter combination;
    Generation module, it is random to generate look-up table source file for running the first generation code block;
    Collector for being compiled to the look-up table source file, obtains whitepack library file.
  6. 6. generating means as claimed in claim 5, which is characterized in that the determining module, specifically for from the library received The first parameter combination is determined in file generated request;The corresponding first generation of code library to be matched according to parameter combination selection Code block.
  7. 7. generating means as claimed in claim 5, which is characterized in that the generation module, specifically for operation described first Code block, dynamic random generate the fixed code of at least one look-up table and corresponding each look-up table, wherein, the fixed code Record has search rule when table lookup operation is performed at least one look-up table.
  8. 8. generating means as claimed in claim 7, which is characterized in that the collector, specifically at least one by described in A look-up table is combined with the fixed code of corresponding each look-up table;To at least one look-up table after combination and right The fixed code of each look-up table is answered to be compiled, obtains whitepack library file.
  9. 9. a kind of generating means of whitepack library file, which is characterized in that including:Memory, processor and it is stored in the storage On device and the computer program that can run on the processor, realized such as when the computer program is performed by the processor The step of method any one of Claims 1-4.
  10. 10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, when the computer program is executed by processor realize according to any one of claims 1 to 4 method the step of.
CN201711484177.3A 2017-12-29 2017-12-29 Method and device for generating white box library file Active CN108134673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711484177.3A CN108134673B (en) 2017-12-29 2017-12-29 Method and device for generating white box library file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711484177.3A CN108134673B (en) 2017-12-29 2017-12-29 Method and device for generating white box library file

Publications (2)

Publication Number Publication Date
CN108134673A true CN108134673A (en) 2018-06-08
CN108134673B CN108134673B (en) 2021-08-13

Family

ID=62393995

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711484177.3A Active CN108134673B (en) 2017-12-29 2017-12-29 Method and device for generating white box library file

Country Status (1)

Country Link
CN (1) CN108134673B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714154A (en) * 2019-03-05 2019-05-03 同济大学 Whitepack cryptographic algorithm under code cubage difficulty whitepack security model
CN110149312A (en) * 2019-04-09 2019-08-20 北京奇艺世纪科技有限公司 Data processing method, device, system and computer readable storage medium
CN111431888A (en) * 2020-03-19 2020-07-17 深圳市道旅旅游科技股份有限公司 Method, device, equipment and storage medium for shielding key information
CN111741374A (en) * 2020-06-10 2020-10-02 北京奇艺世纪科技有限公司 Method and device for acquiring white box lookup table, electronic equipment, storage medium and server
CN112887263A (en) * 2020-12-29 2021-06-01 美的集团股份有限公司 Data transmission method in equipment, method and device for realizing data transmission in equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7769165B2 (en) * 2005-10-14 2010-08-03 Microsoft Corporation Semi-public white-box cipher
CN102047220A (en) * 2008-05-23 2011-05-04 爱迪德加拿大公司 System and method for generating white-box implementations of software applications
CN106209346A (en) * 2015-06-01 2016-12-07 恩智浦有限公司 Whitepack cryptographic technique is interlocked look-up table
CN106411518A (en) * 2016-09-26 2017-02-15 北京洋浦伟业科技发展有限公司 Symmetric white box encryption method with unfixed key and apparatus
CN106612182A (en) * 2016-12-22 2017-05-03 中国电子科技集团公司第三十研究所 Method for implementing SM2 white-box digital signature based on residue number system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7769165B2 (en) * 2005-10-14 2010-08-03 Microsoft Corporation Semi-public white-box cipher
CN102047220A (en) * 2008-05-23 2011-05-04 爱迪德加拿大公司 System and method for generating white-box implementations of software applications
CN106209346A (en) * 2015-06-01 2016-12-07 恩智浦有限公司 Whitepack cryptographic technique is interlocked look-up table
CN106411518A (en) * 2016-09-26 2017-02-15 北京洋浦伟业科技发展有限公司 Symmetric white box encryption method with unfixed key and apparatus
CN106612182A (en) * 2016-12-22 2017-05-03 中国电子科技集团公司第三十研究所 Method for implementing SM2 white-box digital signature based on residue number system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109714154A (en) * 2019-03-05 2019-05-03 同济大学 Whitepack cryptographic algorithm under code cubage difficulty whitepack security model
CN109714154B (en) * 2019-03-05 2021-10-29 同济大学 Implementation method of white-box cryptographic algorithm under white-box security model with difficult code volume
CN110149312A (en) * 2019-04-09 2019-08-20 北京奇艺世纪科技有限公司 Data processing method, device, system and computer readable storage medium
CN110149312B (en) * 2019-04-09 2021-10-15 北京奇艺世纪科技有限公司 Data processing method, device, system and computer readable storage medium
CN111431888A (en) * 2020-03-19 2020-07-17 深圳市道旅旅游科技股份有限公司 Method, device, equipment and storage medium for shielding key information
CN111741374A (en) * 2020-06-10 2020-10-02 北京奇艺世纪科技有限公司 Method and device for acquiring white box lookup table, electronic equipment, storage medium and server
CN111741374B (en) * 2020-06-10 2022-10-21 北京奇艺世纪科技有限公司 Method and device for acquiring white box lookup table, electronic equipment, storage medium and server
CN112887263A (en) * 2020-12-29 2021-06-01 美的集团股份有限公司 Data transmission method in equipment, method and device for realizing data transmission in equipment

Also Published As

Publication number Publication date
CN108134673B (en) 2021-08-13

Similar Documents

Publication Publication Date Title
CN108111622A (en) A kind of method, apparatus and system for downloading whitepack library file
CN108134673A (en) A kind of method and device for generating whitepack library file
CN108183796A (en) The method and device of encryption and decryption is carried out using whitepack library file and whitepack key file
CN110266467B (en) Method and device for realizing dynamic encryption based on block height
CN107947917A (en) A kind of method and device for generating whitepack key
CN106055936B (en) Executable program data packet encrypting/decrypting method and device
CN110826031B (en) Encryption method, device, computer equipment and storage medium
US7970133B2 (en) System and method for secure and flexible key schedule generation
CN108628611A (en) A kind of data calling method and data call device
CN110276610B (en) Method and device for realizing dynamic encryption based on transaction offset
CN111191195A (en) Method and device for protecting APK
CN108416224B (en) A kind of data encryption/decryption method and device
CN107196907A (en) A kind of guard method of Android SO files and device
CN108494546A (en) A kind of whitepack encryption method, device and storage medium
US10572635B2 (en) Automatic correction of cryptographic application program interfaces
CN108898008A (en) The operation method and device of application program
CN110263547B (en) Method and device for realizing dynamic encryption based on contract state modification sequence
CN107220528A (en) The protection of java applet and operation method, device and terminal
CN104182691B (en) data encryption method and device
CN107968793A (en) A kind of method, apparatus and system for downloading whitepack key
CN104504309A (en) Data encryption method and terminal for application program
CN110032832B (en) Web application processing method and device
CN111092716A (en) Encryption mode realization method, device, equipment and medium of AES (advanced encryption Standard) algorithm
US11356271B2 (en) Systems and methods for providing a trusted keystore
CN115801271A (en) Method, equipment and storage medium for realizing dynamic password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant